A tool to remotely detect unusual sessions opened on windows machines using RPC
☆119Jun 10, 2025Updated 8 months ago
Alternatives and similar repositories for FindUnusualSessions
Users that are interested in FindUnusualSessions are comparing it to the libraries listed below
Sorting:
- A bunch of shenanigans using functions, VEH and more☆37Jun 8, 2025Updated 8 months ago
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆41Dec 8, 2023Updated 2 years ago
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Feb 10, 2025Updated last year
- Offensive GPO dumping and analysis tool that leverages and enriches BloodHound data☆358Jan 8, 2026Updated last month
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆262Feb 21, 2025Updated last year
- SACL Scanner is a tool designed to scan and analyze SACLs.☆51Feb 13, 2025Updated last year
- SOAPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆164Jan 23, 2026Updated last month
- Docker container for running CobaltStrike 4.7 and above☆24Mar 20, 2025Updated 11 months ago
- Python implementation of GhostPack's Seatbelt situational awareness tool☆271Nov 12, 2024Updated last year
- ☆234Oct 8, 2024Updated last year
- DFSCoerce exe revisited version with custom authentication☆42Jan 13, 2024Updated 2 years ago
- Parser and reconciliation tooling for large Active Directory environments.☆33Feb 18, 2025Updated last year
- ☆163Nov 19, 2025Updated 3 months ago
- A cross-platform tool to find and decrypt Group Policy Preferences passwords from the SYSVOL share using low-privileged domain accounts☆169Jun 29, 2025Updated 8 months ago
- Azure Post Exploitation Framework☆244Oct 27, 2025Updated 4 months ago
- ☆198Mar 28, 2025Updated 11 months ago
- Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domai…☆275Dec 27, 2024Updated last year
- ☆20Sep 6, 2025Updated 5 months ago
- Vectored Exception Handling Squared☆29Dec 27, 2025Updated 2 months ago
- Safe Harbor is a BOF that streamlines process reconnaissance for red team operations by identifying trusted, low-noise targets to maintai…☆76Oct 27, 2025Updated 4 months ago
- Tool for working with Indirect System Calls in Cobalt Strike's Beacon Object Files (BOF) using SysWhispers3 for EDR evasion☆102Jul 9, 2025Updated 7 months ago
- A PoC for Early Cascade process injection technique.☆211Jan 30, 2025Updated last year
- ☆38Apr 15, 2025Updated 10 months ago
- BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR☆21Feb 8, 2024Updated 2 years ago
- psexecsvc - a python implementation of PSExec's native service implementation☆238Feb 11, 2025Updated last year
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆78Feb 8, 2023Updated 3 years ago
- self-hosted Azure OSINT tool☆33Jun 24, 2025Updated 8 months ago
- A BloodHound collector for Microsoft Configuration Manager☆391Jul 7, 2025Updated 7 months ago
- Cobalt Strike BOF for evasive .NET assembly execution☆308Mar 31, 2025Updated 11 months ago
- Proof of Concept (PoC) .NET tool for remotely killing EDR with WDAC☆423Sep 29, 2025Updated 5 months ago
- 🖥️ Windows 🚀 A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during …☆54Jan 26, 2026Updated last month
- ☆138Nov 17, 2025Updated 3 months ago
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆75May 1, 2024Updated last year
- A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.☆372Sep 29, 2025Updated 5 months ago
- Cobalt Strike BOF☆43Dec 10, 2025Updated 2 months ago
- ☆41Feb 20, 2025Updated last year
- Repository for Ludus french templates☆21Updated this week
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆133Apr 13, 2025Updated 10 months ago
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆637May 8, 2025Updated 9 months ago